220 likes | 233 Views
Explore the social and legal issues surrounding artificial intelligence, including job displacement, human judgment, computer enhancements of humans, privacy concerns, computer crime, and constitutional rights.
E N D
Lecture 27 Social & Legal Issues (S&G, ch. 14) CS 100 - Lecture 27
Social Implications ofArtificial Intelligence CS 100 - Lecture 27
Kismet (Brooks’ Lab, MIT) • Responds to a face with a happy expression • Responds to rapidly moving face with disgusted expression CS 100 - Lecture 27
Kismet (Brooks’ Lab, MIT) • Example of three-way conversational interaction CS 100 - Lecture 27
Social Implications of AI • Elimination of jobs • Replacing human judgment by machine judgment • Altering our understanding of ourselves CS 100 - Lecture 27
Consider Computers that are More Intelligent than Humans • Suppose it’s impossible • establishing this would require some kind of scientific proof that a computer cannot emulate a brain, or that a brain is not sufficient for intelligence • in either case, a major scientific breakthrough • Suppose it’s possible • could displace us in all intellectual activities • if we had nothing to do, what would it mean to be human? • would/should humans be obsolete? CS 100 - Lecture 27
Computer Enhancements of Humans • Computers are already embedded in humans to correct problems • pacemakers, cochlear implants, etc. • Computers have also been embedded for enhancing human abilities • This technology may advance very quickly • How does this affect our understanding of human ability and accomplishment • analogy: use of performance-enhancing drugs CS 100 - Lecture 27
Social & Legal Issues CS 100 - Lecture 27
Promethean Fire • “All technology is non-neutral” • Technologies influencefocus & action • Computer technology has: • social benefits • social costs • Often, issues are not peculiar to computers, but are amplified by computer technology • Sometimes problems arise from using computers as they are intended to be used CS 100 - Lecture 27
Privacy • Government databases (federal & state) • Computer matching • Computer profiling • Open & closed files CS 100 - Lecture 27
Uses of Personal Data • Marketing • Decision making • Other uses: • secondary use • invisible information gathering • information from children • “Information underground” CS 100 - Lecture 27
Example: Google Mail • Google.com is introducing a new, free email service • Why? • By scanning the content of your emails, they will be able to compile a profile of your interests • Then they will be able to present advertisements targeted to you • A way of bringing you only the information you are potentially interested in and stimulating business? • An invasion of privacy? CS 100 - Lecture 27
Access control Audit trails Encryption Ethical use policies Informed consent Regulation Ownership of data Contracts Markets, options & consumer pressure Protecting Privacy CS 100 - Lecture 27
Computer Error • Overdependence on computers • Example illustrating issues: computerized voting • ampliative & reductive • Major failures • Lesser failures • Limitations of computer simulation CS 100 - Lecture 27
Simulation & Models • Recall our discussion of models: • a model is intended to address a certain class of questions or issues • models make simplifying assumptions • Recall the omission of aerodynamic stability from bridge models before the Tacoma Narrows Bridge disaster • Nevertheless, computer models & simulations are essential CS 100 - Lecture 27
Evaluating Models • How well is the underlying science understood? • What sorts of simplifying assumptions are made? • How well does the model agree with experimental results? CS 100 - Lecture 27
Computer Crime • Often just a new or “better” way to commit traditional crimes • Ampliative aspects of computer technology • may allow committing crimes on a larger scale • Reductive aspects of computer technology • may make it harder to detect crimes, identify criminals, etc. CS 100 - Lecture 27
Some Kinds of Computer Crime • Fraud, embezzlement & theft • Stealing (data) • “Hacking” (system cracking) • individual systems • the information infrastructure • benign hacking? • Viruses & worms: reproduce selves • virus: hides in another program • worm: an independent program CS 100 - Lecture 27
Constitutional & Civil Liberties Issues • 1st Amendment protects freedom of speech & press • 4th Amendment protects against unreasonable search & seizure • Do they apply to electronic & other new media? • So far, the courts generally have held them to apply, but there is much uncertainty CS 100 - Lecture 27
Communication Media • Is the operator of a communication medium responsible for the information it carries? • analogy: telephone companies & post office • analogy: a privately-owned meeting room • Can the operator restrict this information? • analogy: telephone companies & post office • analogy: private presses CS 100 - Lecture 27
Encryption & Wiretapping • Encryption can be used to ensure privacy & authenticity • may be used for legal/illegal purposes • May be subject to export restrictions • What provisions should be made for government interception & recording of communications? • What limits should be imposed on the government CS 100 - Lecture 27
These issues are especially relevant since passage of“USA PATRIOT” Act CS 100 - Lecture 27